Cyber

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

“Computers housing the world’s most sensitive data are usually ‘air-gapped’ or isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers. All of this is done to keep important data out of the hands of remote hackers. But these security measures may be futile in the face of a new technique researchers in Israel have developed for stealthily extracting sensitive data from isolated machines—using radio frequency signals and a mobile phone.”

Source: How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data | WIRED

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.